Author: Bert Rankin

Three days of crowded presentations attest to extreme interest in advanced malware protection and the importance of quickly detecting and responding to data breaches.
[embed width="700" height="400"]https://www.slideshare.net/lastlinesecurity/infosec-europe-2017-highlights-lastline-inc[/embed]
Infosecurity Europe 2017
This past week, Lastline was a sponsor of Infosecurity Europe, the region’s largest and most important information...

When President Trump signed his executive order on cybersecurity in May, he set the stage for a new round of cybersecurity innovation. Although there are several aspects of the order that will likely boost cybersecurity investment, accountability will be the key ingredient.
The president began his...

The media has widely covered the WannaCry ransomware attacks. It would be difficult to find anyone who hasn’t heard about WannaCry, even among those that don’t follow technology. One positive outcome of this publicity is a significant increase in awareness. That’s a good thing. There...

Verizon’s recently released 2017 Data Breach Investigation Report shows that in 81% of the hacking-related breaches that were studied, cybercriminals used stolen passwords to gain access to their victim’s information systems. This sobering statistic highlights the need for organizations to detect and prevent password theft...

The recent onslaught of ransomware should motivate all organizations to have effective backup procedures. But recent surveys indicate backups aren’t happening like they should, highlighting the importance for businesses to deploy strong ransomware protection.
Within the last month or so, surveys from multiple vendors who provide...

The Australian government is contemplating legislation that would require an Internet service provider (ISP) to protect users from malware. While ISPs should do more to prevent the spread of malware, ultimately businesses and individuals must assume responsibility.
Dan Tehan, Australia’s minister of cybersecurity is pushing for Telco’s...

Last month's Punycode phishing attack demonstrates the ongoing craftiness of cybercriminals and reinforces the need for tenacious countermeasures to detect and defeat advanced malware.
In the last few weeks, we’ve observed a new and very clever cybersecurity attack. A new variation of an internationalized domain name...

The idea of fileless malware has received a lot of attention lately, and with good reason. In its relatively short life, fileless malware has successfully infiltrated a number of financial and other institutions that are generally thought of as being very secure, and at least...

There’s been a lot of news lately about a new variant of Cerber ransomware that evades malware detection products that rely on static machine learning. Like other forms of advanced malware, Cerber’s evasion tactics continue to evolve.
Cerber Ransomware Enhanced
Cerber, one of, if not the most prevalent...

According to Gartner, the number of worldwide Internet-connected devices will grow to 11.4 billion by 2018. That’s an enormous number of new devices on our networks—and many, perhaps the majority of them, are extremely vulnerable to IoT malware attacks.
Recently, self-propagating malware has infected IoT devices...